Proxy re-encryption for privacy enhancement in Blockchain: Carpooling use case

Blockchain is an especially promising and revolutionary technology that brings transparency in a scalable way for multiple organizations and this is thanks to its several features. There are some exciting blockchain features but among them, decentralization is undoubtedly the most interesting one. Organizations can share data within a distributed ledger. As a consequence, each one can access synchronized data stored in its local Blockchain node. This functionality improves transaction tracking and facilitates access to data within a private group of organizations. However, in some cases, even if organizations accept to share data, they require to hide some private information related to their users or their business model. To tackle privacy and trust issues between organizations, this paper presents a blockchain architecture based on the proxy re-encryption scheme. This scheme is integrated within smart contracts to provide a very efficient, fast, and secure platform. The proposed architecture is implemented in an Hyperledger Blockchain and tested in a real transport and mobility use case.

[1]  Rui Zhang,et al.  Security and Privacy on Blockchain , 2019, ACM Comput. Surv..

[2]  Pingshui Wang Identity-based multi-condition proxy re-encryption , 2016 .

[3]  Javier López,et al.  Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation , 2017, J. Netw. Comput. Appl..

[4]  Sanjay Kumar Madria,et al.  An efficient and secure data sharing framework using homomorphic encryption in the cloud , 2012, Cloud-I '12.

[5]  Narn-Yih Lee,et al.  Blockchain and smart contract for digital certificate , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).

[6]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[7]  Peter Christen,et al.  A taxonomy of privacy-preserving record linkage techniques , 2013, Inf. Syst..

[8]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[9]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[10]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[11]  Erhard Rahm,et al.  PRIMAT: A Toolbox for Fast Privacy-preserving Matching , 2019, Proc. VLDB Endow..

[12]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[13]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[14]  SousaLeonel,et al.  A Survey on Fully Homomorphic Encryption , 2017 .

[15]  Rajeev Anand Sahu,et al.  Secure Certificateless Proxy Re-encryption Without Pairing , 2017, IWSEC.

[16]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.